mirror of
https://github.com/neondatabase/neon.git
synced 2026-05-18 13:40:37 +00:00
Part of #8128, fixes #8872. ## Problem See #8872. ## Summary of changes - Retry `list_timeline_blobs` another time if - there are layer file keys listed but not index. - failed to download index. - Instrument code with `analyze-tenant` and `analyze-timeline` span. - Remove `initdb_archive` check, it could have been deleted. - Return with exit code 1 on fatal error if `--exit-code` parameter is set. Signed-off-by: Yuchen Liang <yuchen@neon.tech>
415 lines
14 KiB
Rust
415 lines
14 KiB
Rust
use anyhow::{anyhow, bail, Context};
|
|
use camino::Utf8PathBuf;
|
|
use pageserver_api::controller_api::{MetadataHealthUpdateRequest, MetadataHealthUpdateResponse};
|
|
use pageserver_api::shard::TenantShardId;
|
|
use reqwest::{Method, Url};
|
|
use storage_controller_client::control_api;
|
|
use storage_scrubber::garbage::{find_garbage, purge_garbage, PurgeMode};
|
|
use storage_scrubber::pageserver_physical_gc::GcMode;
|
|
use storage_scrubber::scan_pageserver_metadata::scan_pageserver_metadata;
|
|
use storage_scrubber::scan_safekeeper_metadata::DatabaseOrList;
|
|
use storage_scrubber::tenant_snapshot::SnapshotDownloader;
|
|
use storage_scrubber::{find_large_objects, ControllerClientConfig};
|
|
use storage_scrubber::{
|
|
init_logging, pageserver_physical_gc::pageserver_physical_gc,
|
|
scan_safekeeper_metadata::scan_safekeeper_metadata, BucketConfig, ConsoleConfig, NodeKind,
|
|
TraversingDepth,
|
|
};
|
|
|
|
use clap::{Parser, Subcommand};
|
|
use utils::id::TenantId;
|
|
|
|
use utils::{project_build_tag, project_git_version};
|
|
|
|
project_git_version!(GIT_VERSION);
|
|
project_build_tag!(BUILD_TAG);
|
|
|
|
#[derive(Parser)]
|
|
#[command(author, version, about, long_about = None)]
|
|
#[command(arg_required_else_help(true))]
|
|
struct Cli {
|
|
#[command(subcommand)]
|
|
command: Command,
|
|
|
|
#[arg(short, long, default_value_t = false)]
|
|
delete: bool,
|
|
|
|
#[arg(long)]
|
|
/// URL to storage controller. e.g. http://127.0.0.1:1234 when using `neon_local`
|
|
controller_api: Option<Url>,
|
|
|
|
#[arg(long)]
|
|
/// JWT token for authenticating with storage controller. Requires scope 'scrubber' or 'admin'.
|
|
controller_jwt: Option<String>,
|
|
|
|
/// If set to true, the scrubber will exit with error code on fatal error.
|
|
#[arg(long, default_value_t = false)]
|
|
exit_code: bool,
|
|
}
|
|
|
|
#[derive(Subcommand, Debug)]
|
|
enum Command {
|
|
FindGarbage {
|
|
#[arg(short, long)]
|
|
node_kind: NodeKind,
|
|
#[arg(short, long, default_value_t=TraversingDepth::Tenant)]
|
|
depth: TraversingDepth,
|
|
#[arg(short, long, default_value_t = String::from("garbage.json"))]
|
|
output_path: String,
|
|
},
|
|
PurgeGarbage {
|
|
#[arg(short, long)]
|
|
input_path: String,
|
|
#[arg(short, long, default_value_t = PurgeMode::DeletedOnly)]
|
|
mode: PurgeMode,
|
|
#[arg(long = "min-age")]
|
|
min_age: humantime::Duration,
|
|
},
|
|
#[command(verbatim_doc_comment)]
|
|
ScanMetadata {
|
|
#[arg(short, long)]
|
|
node_kind: NodeKind,
|
|
#[arg(short, long, default_value_t = false)]
|
|
json: bool,
|
|
#[arg(long = "tenant-id", num_args = 0..)]
|
|
tenant_ids: Vec<TenantShardId>,
|
|
#[arg(long = "post", default_value_t = false)]
|
|
post_to_storcon: bool,
|
|
#[arg(long, default_value = None)]
|
|
/// For safekeeper node_kind only, points to db with debug dump
|
|
dump_db_connstr: Option<String>,
|
|
/// For safekeeper node_kind only, table in the db with debug dump
|
|
#[arg(long, default_value = None)]
|
|
dump_db_table: Option<String>,
|
|
/// For safekeeper node_kind only, json list of timelines and their lsn info
|
|
#[arg(long, default_value = None)]
|
|
timeline_lsns: Option<String>,
|
|
},
|
|
TenantSnapshot {
|
|
#[arg(long = "tenant-id")]
|
|
tenant_id: TenantId,
|
|
#[arg(long = "concurrency", short = 'j', default_value_t = 8)]
|
|
concurrency: usize,
|
|
#[arg(short, long)]
|
|
output_path: Utf8PathBuf,
|
|
},
|
|
PageserverPhysicalGc {
|
|
#[arg(long = "tenant-id", num_args = 0..)]
|
|
tenant_ids: Vec<TenantShardId>,
|
|
#[arg(long = "min-age")]
|
|
min_age: humantime::Duration,
|
|
#[arg(short, long, default_value_t = GcMode::IndicesOnly)]
|
|
mode: GcMode,
|
|
},
|
|
FindLargeObjects {
|
|
#[arg(long = "min-size")]
|
|
min_size: u64,
|
|
#[arg(short, long, default_value_t = false)]
|
|
ignore_deltas: bool,
|
|
#[arg(long = "concurrency", short = 'j', default_value_t = 64)]
|
|
concurrency: usize,
|
|
},
|
|
CronJob {
|
|
// PageserverPhysicalGc
|
|
#[arg(long = "min-age")]
|
|
gc_min_age: humantime::Duration,
|
|
#[arg(short, long, default_value_t = GcMode::IndicesOnly)]
|
|
gc_mode: GcMode,
|
|
// ScanMetadata
|
|
#[arg(long = "post", default_value_t = false)]
|
|
post_to_storcon: bool,
|
|
},
|
|
}
|
|
|
|
#[tokio::main]
|
|
async fn main() -> anyhow::Result<()> {
|
|
let cli = Cli::parse();
|
|
|
|
let bucket_config = BucketConfig::from_env()?;
|
|
|
|
let command_log_name = match &cli.command {
|
|
Command::ScanMetadata { .. } => "scan",
|
|
Command::FindGarbage { .. } => "find-garbage",
|
|
Command::PurgeGarbage { .. } => "purge-garbage",
|
|
Command::TenantSnapshot { .. } => "tenant-snapshot",
|
|
Command::PageserverPhysicalGc { .. } => "pageserver-physical-gc",
|
|
Command::FindLargeObjects { .. } => "find-large-objects",
|
|
Command::CronJob { .. } => "cron-job",
|
|
};
|
|
let _guard = init_logging(&format!(
|
|
"{}_{}_{}_{}.log",
|
|
std::env::args().next().unwrap(),
|
|
command_log_name,
|
|
bucket_config.bucket,
|
|
chrono::Utc::now().format("%Y_%m_%d__%H_%M_%S")
|
|
));
|
|
|
|
tracing::info!("version: {}, build_tag {}", GIT_VERSION, BUILD_TAG);
|
|
|
|
let controller_client = cli.controller_api.map(|controller_api| {
|
|
ControllerClientConfig {
|
|
controller_api,
|
|
// Default to no key: this is a convenience when working in a development environment
|
|
controller_jwt: cli.controller_jwt.unwrap_or("".to_owned()),
|
|
}
|
|
.build_client()
|
|
});
|
|
|
|
match cli.command {
|
|
Command::ScanMetadata {
|
|
json,
|
|
tenant_ids,
|
|
node_kind,
|
|
post_to_storcon,
|
|
dump_db_connstr,
|
|
dump_db_table,
|
|
timeline_lsns,
|
|
} => {
|
|
if let NodeKind::Safekeeper = node_kind {
|
|
let db_or_list = match (timeline_lsns, dump_db_connstr) {
|
|
(Some(timeline_lsns), _) => {
|
|
let timeline_lsns = serde_json::from_str(&timeline_lsns).context("parsing timeline_lsns")?;
|
|
DatabaseOrList::List(timeline_lsns)
|
|
}
|
|
(None, Some(dump_db_connstr)) => {
|
|
let dump_db_table = dump_db_table.ok_or_else(|| anyhow::anyhow!("dump_db_table not specified"))?;
|
|
let tenant_ids = tenant_ids.iter().map(|tshid| tshid.tenant_id).collect();
|
|
DatabaseOrList::Database { tenant_ids, connstr: dump_db_connstr, table: dump_db_table }
|
|
}
|
|
(None, None) => anyhow::bail!("neither `timeline_lsns` specified, nor `dump_db_connstr` and `dump_db_table`"),
|
|
};
|
|
let summary = scan_safekeeper_metadata(bucket_config.clone(), db_or_list).await?;
|
|
if json {
|
|
println!("{}", serde_json::to_string(&summary).unwrap())
|
|
} else {
|
|
println!("{}", summary.summary_string());
|
|
}
|
|
if summary.is_fatal() {
|
|
bail!("Fatal scrub errors detected");
|
|
}
|
|
if summary.is_empty() {
|
|
// Strictly speaking an empty bucket is a valid bucket, but if someone ran the
|
|
// scrubber they were likely expecting to scan something, and if we see no timelines
|
|
// at all then it's likely due to some configuration issues like a bad prefix
|
|
bail!(
|
|
"No timelines found in bucket {} prefix {}",
|
|
bucket_config.bucket,
|
|
bucket_config
|
|
.prefix_in_bucket
|
|
.unwrap_or("<none>".to_string())
|
|
);
|
|
}
|
|
Ok(())
|
|
} else {
|
|
scan_pageserver_metadata_cmd(
|
|
bucket_config,
|
|
controller_client.as_ref(),
|
|
tenant_ids,
|
|
json,
|
|
post_to_storcon,
|
|
cli.exit_code,
|
|
)
|
|
.await
|
|
}
|
|
}
|
|
Command::FindGarbage {
|
|
node_kind,
|
|
depth,
|
|
output_path,
|
|
} => {
|
|
let console_config = ConsoleConfig::from_env()?;
|
|
find_garbage(bucket_config, console_config, depth, node_kind, output_path).await
|
|
}
|
|
Command::PurgeGarbage {
|
|
input_path,
|
|
mode,
|
|
min_age,
|
|
} => purge_garbage(input_path, mode, min_age.into(), !cli.delete).await,
|
|
Command::TenantSnapshot {
|
|
tenant_id,
|
|
output_path,
|
|
concurrency,
|
|
} => {
|
|
let downloader =
|
|
SnapshotDownloader::new(bucket_config, tenant_id, output_path, concurrency).await?;
|
|
downloader.download().await
|
|
}
|
|
Command::PageserverPhysicalGc {
|
|
tenant_ids,
|
|
min_age,
|
|
mode,
|
|
} => {
|
|
pageserver_physical_gc_cmd(
|
|
&bucket_config,
|
|
controller_client.as_ref(),
|
|
tenant_ids,
|
|
min_age,
|
|
mode,
|
|
)
|
|
.await
|
|
}
|
|
Command::FindLargeObjects {
|
|
min_size,
|
|
ignore_deltas,
|
|
concurrency,
|
|
} => {
|
|
let summary = find_large_objects::find_large_objects(
|
|
bucket_config,
|
|
min_size,
|
|
ignore_deltas,
|
|
concurrency,
|
|
)
|
|
.await?;
|
|
println!("{}", serde_json::to_string(&summary).unwrap());
|
|
Ok(())
|
|
}
|
|
Command::CronJob {
|
|
gc_min_age,
|
|
gc_mode,
|
|
post_to_storcon,
|
|
} => {
|
|
run_cron_job(
|
|
bucket_config,
|
|
controller_client.as_ref(),
|
|
gc_min_age,
|
|
gc_mode,
|
|
post_to_storcon,
|
|
cli.exit_code,
|
|
)
|
|
.await
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Runs the scrubber cron job.
|
|
/// 1. Do pageserver physical gc
|
|
/// 2. Scan pageserver metadata
|
|
pub async fn run_cron_job(
|
|
bucket_config: BucketConfig,
|
|
controller_client: Option<&control_api::Client>,
|
|
gc_min_age: humantime::Duration,
|
|
gc_mode: GcMode,
|
|
post_to_storcon: bool,
|
|
exit_code: bool,
|
|
) -> anyhow::Result<()> {
|
|
tracing::info!(%gc_min_age, %gc_mode, "Running pageserver-physical-gc");
|
|
pageserver_physical_gc_cmd(
|
|
&bucket_config,
|
|
controller_client,
|
|
Vec::new(),
|
|
gc_min_age,
|
|
gc_mode,
|
|
)
|
|
.await?;
|
|
tracing::info!(%post_to_storcon, node_kind = %NodeKind::Pageserver, "Running scan-metadata");
|
|
scan_pageserver_metadata_cmd(
|
|
bucket_config,
|
|
controller_client,
|
|
Vec::new(),
|
|
true,
|
|
post_to_storcon,
|
|
exit_code,
|
|
)
|
|
.await?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
pub async fn pageserver_physical_gc_cmd(
|
|
bucket_config: &BucketConfig,
|
|
controller_client: Option<&control_api::Client>,
|
|
tenant_shard_ids: Vec<TenantShardId>,
|
|
min_age: humantime::Duration,
|
|
mode: GcMode,
|
|
) -> anyhow::Result<()> {
|
|
match (controller_client, mode) {
|
|
(Some(_), _) => {
|
|
// Any mode may run when controller API is set
|
|
}
|
|
(None, GcMode::Full) => {
|
|
// The part of physical GC where we erase ancestor layers cannot be done safely without
|
|
// confirming the most recent complete shard split with the controller. Refuse to run, rather
|
|
// than doing it unsafely.
|
|
return Err(anyhow!(
|
|
"Full physical GC requires `--controller-api` and `--controller-jwt` to run"
|
|
));
|
|
}
|
|
(None, GcMode::DryRun | GcMode::IndicesOnly) => {
|
|
// These GcModes do not require the controller to run.
|
|
}
|
|
}
|
|
|
|
let summary = pageserver_physical_gc(
|
|
bucket_config,
|
|
controller_client,
|
|
tenant_shard_ids,
|
|
min_age.into(),
|
|
mode,
|
|
)
|
|
.await?;
|
|
println!("{}", serde_json::to_string(&summary).unwrap());
|
|
Ok(())
|
|
}
|
|
|
|
pub async fn scan_pageserver_metadata_cmd(
|
|
bucket_config: BucketConfig,
|
|
controller_client: Option<&control_api::Client>,
|
|
tenant_shard_ids: Vec<TenantShardId>,
|
|
json: bool,
|
|
post_to_storcon: bool,
|
|
exit_code: bool,
|
|
) -> anyhow::Result<()> {
|
|
if controller_client.is_none() && post_to_storcon {
|
|
return Err(anyhow!("Posting pageserver scan health status to storage controller requires `--controller-api` and `--controller-jwt` to run"));
|
|
}
|
|
match scan_pageserver_metadata(bucket_config.clone(), tenant_shard_ids).await {
|
|
Err(e) => {
|
|
tracing::error!("Failed: {e}");
|
|
Err(e)
|
|
}
|
|
Ok(summary) => {
|
|
if json {
|
|
println!("{}", serde_json::to_string(&summary).unwrap())
|
|
} else {
|
|
println!("{}", summary.summary_string());
|
|
}
|
|
|
|
if post_to_storcon {
|
|
if let Some(client) = controller_client {
|
|
let body = summary.build_health_update_request();
|
|
client
|
|
.dispatch::<MetadataHealthUpdateRequest, MetadataHealthUpdateResponse>(
|
|
Method::POST,
|
|
"control/v1/metadata_health/update".to_string(),
|
|
Some(body),
|
|
)
|
|
.await?;
|
|
}
|
|
}
|
|
|
|
if summary.is_fatal() {
|
|
tracing::error!("Fatal scrub errors detected");
|
|
if exit_code {
|
|
std::process::exit(1);
|
|
}
|
|
} else if summary.is_empty() {
|
|
// Strictly speaking an empty bucket is a valid bucket, but if someone ran the
|
|
// scrubber they were likely expecting to scan something, and if we see no timelines
|
|
// at all then it's likely due to some configuration issues like a bad prefix
|
|
tracing::error!(
|
|
"No timelines found in bucket {} prefix {}",
|
|
bucket_config.bucket,
|
|
bucket_config
|
|
.prefix_in_bucket
|
|
.unwrap_or("<none>".to_string())
|
|
);
|
|
if exit_code {
|
|
std::process::exit(1);
|
|
}
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
}
|
|
}
|